Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.49.59.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.49.59.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:41:08 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 94.59.49.192.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.59.49.192.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.221.124.62 attack
Feb 22 19:21:58 php1 sshd\[26365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.221.124.62  user=root
Feb 22 19:22:00 php1 sshd\[26365\]: Failed password for root from 91.221.124.62 port 35182 ssh2
Feb 22 19:25:43 php1 sshd\[26674\]: Invalid user temp from 91.221.124.62
Feb 22 19:25:43 php1 sshd\[26674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.221.124.62
Feb 22 19:25:45 php1 sshd\[26674\]: Failed password for invalid user temp from 91.221.124.62 port 37262 ssh2
2020-02-23 13:29:11
79.157.219.48 attackspambots
Feb 23 00:21:36 NPSTNNYC01T sshd[29184]: Failed password for root from 79.157.219.48 port 38822 ssh2
Feb 23 00:23:15 NPSTNNYC01T sshd[29251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.157.219.48
Feb 23 00:23:17 NPSTNNYC01T sshd[29251]: Failed password for invalid user rahul from 79.157.219.48 port 45487 ssh2
...
2020-02-23 13:28:36
191.235.91.156 attackspam
Unauthorized connection attempt detected from IP address 191.235.91.156 to port 2220 [J]
2020-02-23 13:43:56
14.232.152.1 attackbotsspam
1582433898 - 02/23/2020 05:58:18 Host: 14.232.152.1/14.232.152.1 Port: 445 TCP Blocked
2020-02-23 13:16:07
5.249.147.195 attack
Port probing on unauthorized port 1433
2020-02-23 13:08:43
165.227.123.146 attackspambots
Feb 23 05:58:19 [host] sshd[24540]: Invalid user i
Feb 23 05:58:19 [host] sshd[24540]: pam_unix(sshd:
Feb 23 05:58:21 [host] sshd[24540]: Failed passwor
2020-02-23 13:12:37
189.42.239.34 attackspam
Feb 23 05:55:13 SilenceServices sshd[4285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.42.239.34
Feb 23 05:55:16 SilenceServices sshd[4285]: Failed password for invalid user user02 from 189.42.239.34 port 47638 ssh2
Feb 23 05:58:01 SilenceServices sshd[6555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.42.239.34
2020-02-23 13:25:25
103.233.87.216 attack
Automatic report - Port Scan Attack
2020-02-23 13:08:16
104.131.189.116 attackbotsspam
Unauthorized connection attempt detected from IP address 104.131.189.116 to port 2220 [J]
2020-02-23 13:15:46
101.108.217.85 attackspam
20/2/22@23:57:46: FAIL: Alarm-Network address from=101.108.217.85
20/2/22@23:57:46: FAIL: Alarm-Network address from=101.108.217.85
...
2020-02-23 13:35:20
185.195.27.206 attack
Feb 23 05:53:18 silence02 sshd[948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.195.27.206
Feb 23 05:53:21 silence02 sshd[948]: Failed password for invalid user lucia from 185.195.27.206 port 33148 ssh2
Feb 23 05:57:34 silence02 sshd[1289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.195.27.206
2020-02-23 13:40:59
103.36.125.225 attackspam
02/23/2020-05:58:14.739374 103.36.125.225 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-02-23 13:18:46
125.138.155.83 attackspam
Feb 22 18:50:14 wbs sshd\[19004\]: Invalid user rsync from 125.138.155.83
Feb 22 18:50:14 wbs sshd\[19004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.138.155.83
Feb 22 18:50:16 wbs sshd\[19004\]: Failed password for invalid user rsync from 125.138.155.83 port 36998 ssh2
Feb 22 18:57:18 wbs sshd\[19603\]: Invalid user usertest from 125.138.155.83
Feb 22 18:57:18 wbs sshd\[19603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.138.155.83
2020-02-23 13:48:30
103.74.124.92 attack
Feb 23 06:24:31 silence02 sshd[3274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.124.92
Feb 23 06:24:33 silence02 sshd[3274]: Failed password for invalid user fabian from 103.74.124.92 port 41430 ssh2
Feb 23 06:27:38 silence02 sshd[3521]: Failed password for root from 103.74.124.92 port 53984 ssh2
2020-02-23 13:36:40
80.82.78.192 attackbotsspam
Feb 23 06:12:31 MK-Root1 kernel: [18832.699697] [UFW BLOCK] IN=enp35s0 OUT=vmbr103 MAC=a8:a1:59:0e:9e:7d:80:7f:f8:79:1c:25:08:00 SRC=80.82.78.192 DST=5.9.239.242 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=22461 PROTO=TCP SPT=58295 DPT=10099 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 23 06:14:09 MK-Root1 kernel: [18930.775499] [UFW BLOCK] IN=enp35s0 OUT=vmbr1 MAC=a8:a1:59:0e:9e:7d:80:7f:f8:79:1c:25:08:00 SRC=80.82.78.192 DST=116.202.171.26 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=51640 PROTO=TCP SPT=58309 DPT=10133 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 23 06:18:26 MK-Root1 kernel: [19187.323225] [UFW BLOCK] IN=enp35s0 OUT=vmbr116 MAC=a8:a1:59:0e:9e:7d:80:7f:f8:79:1c:25:08:00 SRC=80.82.78.192 DST=5.9.239.255 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=61710 PROTO=TCP SPT=58321 DPT=10256 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-23 13:21:47

Recently Reported IPs

96.15.225.107 195.67.199.51 125.119.26.147 81.252.21.104
35.207.183.47 64.87.148.26 244.59.207.91 196.82.152.76
153.151.165.79 190.56.184.235 232.91.15.145 146.185.147.221
19.229.10.50 24.62.68.72 81.249.141.46 95.141.162.58
78.177.152.177 122.74.48.86 130.152.56.147 250.20.134.205